Chp 4 IAM Flashcards
FRR
False Rejection Rate (FRR)
The rate at which a legitimate user is incorrectly rejected by the system.
FAR
False Acceptance Rate (FAR)
The rate at which an unauthorized user is incorrectly accepted by the system.
CER
Crossover Error Rate (CER)
The point at which the rates of FRR and FAR are equal.
FER
Failure to Enroll Rate (FER)
Failure to Enroll Rate (FER) refers to the percentage of instances where the system fails to create a template for a user during the enrollment process. This template is necessary for subsequent authentication attempts.
FIDO
Fast Identity Online (FIDO)
is an open authentication standard that strengthens and simplifies two-factor authentication (2FA) by using specialized hardware devices.
hard authentication token
also known as a hardware token, is a physical device used to authenticate a user’s identity. These tokens provide an additional layer of security by requiring something the user possesses in addition to something they know (e.g., a password).
soft authentication token
also known as a software token, is a digital form of an authentication token that is typically implemented as an application or software on a user’s device (e.g., smartphone, tablet, or computer). Soft tokens provide a convenient way to implement two-factor authentication (2FA) without the need for physical hardware.
Attestation
the process of verifying the authenticity and integrity of a device or system.
Think “Trusted Platform Module computer chip to prove root of trust”
DAC
Discretionary Access Control (DAC) is a type of access control model where the owner of the resource (such as files or data) has the authority to determine who can access it. The owner decides which users are granted access to specific resources and what operations they can perform.
“It is also the easiest to compromise, as it is vulnerable to insider threats and abuse of compromised accounts.”
MAC
Mandatory access control (MAC) is based on security clearance levels. For example, a user with Top Secret clearance could read data with Top Secret, Secret, and Confidential classification labels. A user with Secret clearance could access Secret and Confidential levels only.
ABAC
Attribute-Based Access Control (ABAC)
access control model that makes decisions based on attributes of the user (subject),
User Attributes: Information about the user, such as role, department, clearance level, or location.
RBAC
Role-based access control (RBAC) means that an organization defines its permission requirements in terms of the tasks that an employee or service must be able to perform.
SID
A user account is defined by a unique security identifier (SID) in Windows
GPOs
Group Policy Objects (GPOs) are a set of rules and configurations in Microsoft Windows environments used to manage and configure operating systems, applications, and user settings within an Active Directory (AD) infrastructure.
PAM
Privileged access management (PAM) refers to policies, procedures, and technical controls to prevent compromise of privileged accounts.